6G endogenous security:architecture and key technologies
At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on so...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-01-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020011/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530631954104320 |
---|---|
author | Yang LIU Mugen PENG |
author_facet | Yang LIU Mugen PENG |
author_sort | Yang LIU |
collection | DOAJ |
description | At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided. |
format | Article |
id | doaj-art-e991398d880948e88130ec39cb60f53c |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-01-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-e991398d880948e88130ec39cb60f53c2025-01-15T03:01:14ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-01-01361120595850506G endogenous security:architecture and key technologiesYang LIUMugen PENGAt the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020011/6Gendogenous securityarchitecturekey technology |
spellingShingle | Yang LIU Mugen PENG 6G endogenous security:architecture and key technologies Dianxin kexue 6G endogenous security architecture key technology |
title | 6G endogenous security:architecture and key technologies |
title_full | 6G endogenous security:architecture and key technologies |
title_fullStr | 6G endogenous security:architecture and key technologies |
title_full_unstemmed | 6G endogenous security:architecture and key technologies |
title_short | 6G endogenous security:architecture and key technologies |
title_sort | 6g endogenous security architecture and key technologies |
topic | 6G endogenous security architecture key technology |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020011/ |
work_keys_str_mv | AT yangliu 6gendogenoussecurityarchitectureandkeytechnologies AT mugenpeng 6gendogenoussecurityarchitectureandkeytechnologies |